Remove Government Remove Military Remove Strategy Remove Training
article thumbnail

AUTHOR Q&A: China’s spy balloons reflect a cyber warfare strategy America must counter

The Last Watchdog

Part one of the book catalogues how cyber criminals and US adversaries have taken full advantage of systemic flaws in how we’ve come to defend business and government networks. LW: Your juxtaposition of China’s approach to cyber strategy vs. the U.S. The US needs to be more aware of China’s broader, surreptitious digital strategy.

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

Experts say the leak illustrates how Chinese government agencies increasingly are contracting out foreign espionage campaigns to the nation’s burgeoning and highly competitive cybersecurity industry. In 2021, the Sichuan provincial government named i-SOON as one of “the top 30 information security companies.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wings for This Man: Celebrating the Tuskegee Airmen

Unwritten Record

The country needed to quickly increase the number of soldiers in the military while also increasing the production of wartime goods and manufacturing. To do this, the United States Government employed several strategies to garner the support of the American people. The First Motion Picture Unit, part of the U.S.

article thumbnail

Russian and Belarusian men charged with spying for Russian GRU

Security Affairs

Polish authorities charged Russian and Belarusian individuals with spying for the Russian military intelligence service (GRU). Polish authorities charged Russian and Belarusian individuals, who were arrested in April, with spying for the Russian military intelligence service (GRU) from 2017 to April 2022.

article thumbnail

The US government sanctioned four entities and one individual for supporting cyber operations conducted by North Korea

Security Affairs

The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against four entities and one individual for their role in malicious cyber operations conducted to support the government of North Korea. The sanctioned entities conducted operations to steal funds to support the military strategy of the regime.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

My reporting trip included meetings with Michigan-based cybersecurity vendors pursuing leading-edge innovations, as well as a tour of a number of thriving public-private cybersecurity incubator and training programs. The first Cyber Range training and testing hub opened at Eastern Michigan University in late 2012. Getting proactive.

article thumbnail

GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’

The Last Watchdog

military information for sale on the Dark Web for a nominal sum, in and of itself, is unfortunate and unremarkable. In this case, one can surmise that military personnel, or perhaps a contractor, accessed the documents in question via an off-premise device connected to a home or other open WiFi network. The discovery of sensitive U.S.

Military 145